Hackers are finding ways to bypass sandboxes and sneak in their malware, so some vendors are creating new approaches to counter them. Attackers continue to find ways to evade traditional sandboxes, and some vendors are looking to raise the bar with new approaches to isolating and vetting files.
Sandboxing adds an extra layer of protection, diverting untrusted files or programs from unverified third parties, suppliers, or websites into a separate, secure environment where they can be inspected for malicious code. Based on that inspection, the attachments, files or applications are either allowed to enter or rejected from moving further into the network.

The link for this article located at Dark Reading is no longer available.